Loading
Generated remediation guidance and an executive summary. No account required.
OpenClaw before 2026.3.28 contains a privilege escalation vulnerability allowing authenticated operators with write permissions to access admin-class Telegram configuration and cron persistence settings via the send endpoint. Attackers with operator.write credentials can exploit insufficient access controls to reach sensitive administrative functionality and modify persistence mechanisms.
No affected products information available.
Use CWE-269 to widen CVE-2026-41359 into its surrounding weakness, vendor, and product context.